The Community for Technology Leaders
Computer Security Foundations Workshop, IEEE (1999)
Mordano, Italy
June 28, 1999 to June 30, 1999
ISSN: 1063-6900
ISBN: 0-7695-0201-6

Preface (PDF)

pp. vii
Formal Models

I/O Automaton Models and Proofs for Shared-Key Communication Systems (Abstract)

Nancy Lynch , Massachusetts Institute of Technology
pp. 14
Security Protocol Analysis: Notation, Transformation, and Simplification
Strand Spaces
Panel: Formalization and Proof of Secrecy Properties: Chair: D. Volpano: Panelists: M. Abadi, R. Focardi, C. Meadows and J. Millen
Local Names
Interaction and Composition

Trusted System Construction (Abstract)

Colin O'Halloran , Systems Assurance Group
pp. 124
Logics for Authorization and Access Control

A Logical Framework for Reasoning on Data Access Control Policies (Abstract)

Elisa Bertino , Universit? degli Studi di Milano
Elena Ferrari , Universit? degli Studi di Milano
Francesco Buccafurri , Universit? di Reggio Calabria
Pasquale Rullo , Universit? della Calabria
pp. 175
Advances in Automated Security Protocol Analysis
Noninterference Using Process Algebras

Process Algebra and Non-interference (Abstract)

P Y A Ryan , Defence Evaluation and Research Agency
S A Schneider , University of London
pp. 214

What is Intransitive Noninterference? (Abstract)

A.W. Roscoe , Oxford University
M.H. Goldsmith , Formal Systems (Europe) Ltd
pp. 228

Index of Authors (PDF)

pp. 239
85 ms
(Ver 3.3 (11022016))